Network security evaluation using the NSA IEM /
Network Security Evaluation provides a methodology for conducting technical security evaluations of all the critical components of a target network. The book describes how the methodology evolved and how to define the proper scope of an evaluation, including the consideration of legal issues that ma...
Call Number: | Libro Electrónico |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | Inglés |
Published: |
Rockland, MA : [Sebastopol, Calif.] :
Syngress ; Distributed by O'Reilly Media in the United States and Canada,
�2005.
�2005 |
Subjects: | |
Online Access: | Texto completo |
Table of Contents:
- Introduction to the IEM; Before You Start Evaluating; Setting Expectations; Scoping the Evaluation; Legal Planning Chapter; The Technical Evaluation Plan (TEP); Starting your On-Site Efforts; Enumeration Activities; Collecting the majority of vulnerabilities; Fine Tuning the Evaluation; On-Site Closing Meeting; Evaluation Analysis; Creating Measurements and Trending Results; Trending Metrics Chapter; Final Reporting Chapter; IEM Summary; Appendix A: Table of example tools for each of the 10 baseline activities; Appendix B: Sample TEP layout.